This is a presentation from the MyData Online 2020 Conference that covers the history and evolution of digital identity from the first computers in World War 2 to Enterprise Identity and Access Management and emerging new Self-Sovereign Identity Technology.
This is a talk I was asked to give at the What is Universe? at the University of Oregon, (on their Portland Campus). I cover this history of the Internet Identity Workshop and talk about its core nature as a torus / bowl a feminine form and how this has resulted in the innovation of Self-Sovereign Identity
A presentation addressing the legal implications of social media.. These issues include privacy, copyright, trademark, and trade secrets issues for employers, employees and ISPs, as well as the SPAM Act and FTC rules. ALL RIGHTS RESERVED. Contact me at dsaper [at]saperlaw.com if you'd like to use the presentation or if you have any questions.
This presentation was presented as the pre-opening talk at Identity North 2016 in Toronto. It covers the big question - What is Identity? Key Concepts and Terms. Contextualizing Identity for Enterprise, Government and in the Commons.
Presentation by Sara Meaney, co-owner of Comet Branding, a PR+Social Media agency, and Kelly Twigger, owner of ESI Attorneys on the legal implications of social media given at BizTech 2010 in Milwaukee, Wisconsin on April 30, 2010.
The Domains of Identity presentation covers the 16 domains of Identity outlined in Kaliya's Masters Report written for the Master of Science in Identity Management and Security program. It is available https://www.identitywoman.net/domains-of-identity
This is a presentation from the MyData Online 2020 Conference that covers the history and evolution of digital identity from the first computers in World War 2 to Enterprise Identity and Access Management and emerging new Self-Sovereign Identity Technology.
This is a talk I was asked to give at the What is Universe? at the University of Oregon, (on their Portland Campus). I cover this history of the Internet Identity Workshop and talk about its core nature as a torus / bowl a feminine form and how this has resulted in the innovation of Self-Sovereign Identity
A presentation addressing the legal implications of social media.. These issues include privacy, copyright, trademark, and trade secrets issues for employers, employees and ISPs, as well as the SPAM Act and FTC rules. ALL RIGHTS RESERVED. Contact me at dsaper [at]saperlaw.com if you'd like to use the presentation or if you have any questions.
This presentation was presented as the pre-opening talk at Identity North 2016 in Toronto. It covers the big question - What is Identity? Key Concepts and Terms. Contextualizing Identity for Enterprise, Government and in the Commons.
Presentation by Sara Meaney, co-owner of Comet Branding, a PR+Social Media agency, and Kelly Twigger, owner of ESI Attorneys on the legal implications of social media given at BizTech 2010 in Milwaukee, Wisconsin on April 30, 2010.
The Domains of Identity presentation covers the 16 domains of Identity outlined in Kaliya's Masters Report written for the Master of Science in Identity Management and Security program. It is available https://www.identitywoman.net/domains-of-identity
Social Media Law: The Legal Do's and Don'ts of Social MediaShawn Tuma
This presentation provides an overview of social media law, that is, the legal issues involved in using social media. The presentation provides practical examples of how those issues come about in the business world and provides ways to minimize the risks associated with those issues, including the use of social media policies.
In the age of social media, intellectual property can be murky territory. In this presentation, Primum Marketing Communications, a Milwaukee-based agency, covers social media implications on copyrights, trademarks, patents, defamation and trade secrets. The presentation also takes a look at some Terms of Service and Privacy Policies for several popular social media sites and covers best practices for marketing your brand without crossing the legal line.
Thinking ahead GDPR and CCPA are coming and people are freaking out about how their data is being used. What are the new tools for a Personal Data Ecosystem.
Web 1.0 was an early stage evolution focused on how users could connect to the web through the user interface. Web 2.0 emerged around 2004 and focused mainly on interactivity and collaboration through social media; it too has peaked.
Through the evolution of smart phones and the ongoing improvement of technology, Web 3.0 offers more solutions for browsing and enables consumers to browse application data from anywhere in the world.
Hassan Bawab will share how Web 3.0 started as merely a trend but is quickly becoming the standard.
Capitalizing on Web 3.0 requires providing a mobile experience to end-users. It also means more effective communication and ease of reach. Implementing a Web 3.0 strategy can ultimately lead to improved intelligence and customer engagement for organizations in any industry.
This is the keynote presentation that I gave at MyData 2018. It explains the connection between identity and personal data. Some of my story of how I began working on identity 15 years ago. The Domains of Identity, My master's report is explained and then core components of Self-Sovereign Identity is explained. I conclude sharing some thoughts on how we work together to build alignment.
This is a deck that highlights the origins of my Identity Ecosystem Mapping efforts. It shares snapshots of the prototype map in Kumu and outlines the functionality possible for Version 2.0 using the Knowledge Ecology Interface system developed by SOSACorp.
A global Digital Magna Carta that lays the foundation for everyone’s access to internet is beneficial for trade and social exchange. Since internet is very accessible to all, privacy concerns for people and companies is important to protect. However, there will be exemptions to privacy concerns when technology increases the user experience and make it easier to use internet. Other cases of exemptions will be when it greatly benefit the functioning of society and such examples includes the health sector and the rescue services.
Social Media Law: The Legal Do's and Don'ts of Social MediaShawn Tuma
This presentation provides an overview of social media law, that is, the legal issues involved in using social media. The presentation provides practical examples of how those issues come about in the business world and provides ways to minimize the risks associated with those issues, including the use of social media policies.
In the age of social media, intellectual property can be murky territory. In this presentation, Primum Marketing Communications, a Milwaukee-based agency, covers social media implications on copyrights, trademarks, patents, defamation and trade secrets. The presentation also takes a look at some Terms of Service and Privacy Policies for several popular social media sites and covers best practices for marketing your brand without crossing the legal line.
Thinking ahead GDPR and CCPA are coming and people are freaking out about how their data is being used. What are the new tools for a Personal Data Ecosystem.
Web 1.0 was an early stage evolution focused on how users could connect to the web through the user interface. Web 2.0 emerged around 2004 and focused mainly on interactivity and collaboration through social media; it too has peaked.
Through the evolution of smart phones and the ongoing improvement of technology, Web 3.0 offers more solutions for browsing and enables consumers to browse application data from anywhere in the world.
Hassan Bawab will share how Web 3.0 started as merely a trend but is quickly becoming the standard.
Capitalizing on Web 3.0 requires providing a mobile experience to end-users. It also means more effective communication and ease of reach. Implementing a Web 3.0 strategy can ultimately lead to improved intelligence and customer engagement for organizations in any industry.
This is the keynote presentation that I gave at MyData 2018. It explains the connection between identity and personal data. Some of my story of how I began working on identity 15 years ago. The Domains of Identity, My master's report is explained and then core components of Self-Sovereign Identity is explained. I conclude sharing some thoughts on how we work together to build alignment.
This is a deck that highlights the origins of my Identity Ecosystem Mapping efforts. It shares snapshots of the prototype map in Kumu and outlines the functionality possible for Version 2.0 using the Knowledge Ecology Interface system developed by SOSACorp.
A global Digital Magna Carta that lays the foundation for everyone’s access to internet is beneficial for trade and social exchange. Since internet is very accessible to all, privacy concerns for people and companies is important to protect. However, there will be exemptions to privacy concerns when technology increases the user experience and make it easier to use internet. Other cases of exemptions will be when it greatly benefit the functioning of society and such examples includes the health sector and the rescue services.
Social networking learnings & opportunities web innovation conference, bangal...Rohit Varma
A presentation I made at The Web Innovation conference in 2007. Based largely on my experience as CEO of Indian social networking startup Yo4ya.com. I take a shot at describing what sorts of social networks can succeed.
Building trust in virtual teams -Change Management InstituteKorrine Jones
On 10 September 2014 I had the pleasure of speaking at a Change Management Institute forum in Brisbane, Australia on the topic of Building Trust in Virtual and Dispersed Teams.
Here are 6 out of 10 helpful tips on how to build trust in a relationship. For 4 more tips of this type, click the link: http://vkool.com/how-to-build-trust/.
1. Do Exactly What You Say
Doing exactly what you say is the very first step to make others trust you because actions always speak louder than words. If possible, you should always do better than what you say. For example, if you already said that you could complete 90 percent of work, you should try to fulfill more rather than less of it.
2. Honor Your Promises
If you want to be trusted by others, you should be a dependable person. For example, after making a promise, you had better try to meet it well. If you cannot meet it for some reasons, try to explain it to the promisee decently. After that, create a new promise, and make sure to meet it this time.
Making a promise is always easier than fulfilling it. Therefore, before making any promise, you had better think thoroughly whether you can meet it or not. If the possibility of meeting a promise is not very high, do not make it.
3. Tell The Truth
Being honest or telling the truth is one among the best tips on how to build trust in a relationship. We all know that the truth may hurt for a while, but a lie hurts forever. Therefore, you should always tell the truth for long-term benefits. In case you cannot tell the truth, just keep silence rather than telling a lie.
4. Display Loyalty
You can display your loyalty by protecting other people, especially when they are not present to join your conversation. This is one among the most important techniques on how to build trust as trust is mainly built by honesty and loyalty.
5. Be Competent
Being competent means you can do many things well. If you have good professional ability and interpersonal communication skills, people will not only respect and admire you, but also trust you easily. Therefore, you should learn to build good manners, social skills, and even working skills as a preparation for building trust. When you are competent, you will become reliable, and be trusted by others.
6. Be Objective
Being objective is also a helpful tip on how to build trust in a relationship. When you decide to do something, consider objectively how other people will think about it. Put yourself in others’ shoes, and you will know how they feel, and what they think. The more objective you are, the easier you can build trust.
Trust is always one of the crucial keys to success. If you can get your friends to trust you, your life will certainly be pleasant. If you can make your boss trust you, you can get a promotion really fast. If you can get your spouse to trust you, you will certainly be happy in your family.
Abstract
There has been a tremendous increase of technology - mediated working environment leading to the formation of virtual
teams due to the globalization and it requires a new leadership approach in making them succeed. E-leadership has been
recognized as relevant to lead the virtual team. It is claimed that trust is one of the factors vital to the formation of a
successful virtual team. It is also suggested that building and maintaining trust may be one of the most important factors
leading to virtual team success. However, building trust in a virtual team is a major challenge as team members do not have
face-to-face interaction. Thus, it becomes the sole responsibility of the e-leader in the virtual team to build a trusting relationship between the team members without which the virtual relationship will not succeed. This paper explores the current knowledge about the factors that build trust deemed as critical in virtual team effectiveness and proposed a
framework for building trust in the virtual team. This paper is a reflection for e-leadership in understanding how e-leaders
can build trust in virtual teams that will enhance the performances of virtual teams in the virtual work environment.
Self-Sovereign Identity technology has enormous potential to empower individuals and address privacy challenges globally. It uses shared ledgers (blockchain) to give individuals the power to create and manage their own identifiers, collect verified claims and interact with others on the network on their terms. This lighting talk by one of the pioneers working on this new emerging layer of the internet for 15 years will give a high level picture of how it works covering the core standards and technologies along with outlining some potential use-cases.
Blockchain-Anchored Identity -- Daniel Buchner, Microsoftbernardgolden
In this presentation, Daniel Buchner discusses the need and challenge of identity in the digital society. Particular interest is paid to technical challenges and supporting blockchain technologies
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA
Harrison Tang, CEO at Spokeo
Emerging Tech
Digital identity is who you are in the digital world, and you should be able to control your own identity. In a world where Big Tech controls data on millions of its users, how do we claim our digital identities? Self-sovereign identity gives people the control over their identities by empowering them as intermediaries of identity-related transactions. People are the platform, not Big Tech or governments. Decentralized identity leverages technologies like blockchain and token-based economy to ensure that the identity infrastructure is not controlled by a few companies. Despite the decentralized infrastructure, federated identity enables identity information to be easily aggregated, processed, and available to use for good. Personalized identity individualizes the sharing of identity information (e.g. selective disclosure) based on different people's needs and sharing contexts. Secure identity makes sure that the access to identity information will be more secure, authenticated, and accountable. And lastly, intelligent identity helps streamline identity management.
Verifiable Credentials in Self-Sovereign Identity (SSI)Evernym
On our March 12, 2020 webinar, Evernym Chief Architect Daniel Hardman provided a great introduction to verifiable credentials and compared them to the physical credentials (passports, driver's licenses, loyalty cards) we use every day. He then identified six lessons we can learn from today's physical credentials and how we're applying each to the world of self-sovereign identity.
Presented by Chris Messina (OpenID Foundation), David Recordon (Six Apart), Joseph Smarr (Plaxo). As evidenced by Barack Obama’s successful presidential campaign, we have clearly entered the age of the social web. This developer-oriented workshop will emphasize the use and application of free, open building blocks for enabling social networking features on your site or service, and provide illuminating insights from some of the key figures creating these technologies.
http://en.oreilly.com/oscon2009/public/schedule/detail/8575
Us, Our Organizations and the Evolving Web: Leveraging Identity Tools for Collaboration. This talk was given at the Net Squared 2008 Conference. The goal was to share some of the activity ongoing in the identity community, how it might be used by the nonprofit sector and invite their involvement in its continued development.
Identity can seem deceptively simple. We know who we are. Sometimes we have to convince others of that fact and confirm other characteristics: our age, our qualifications, or our right to access some services or tools. This happens every day over the Internet, but in ways that are disorganized, redundant, and risky. The lack of reliable, universal standards puts our private information at risk of public dissemination, fraud or worse.
The pioneers developing the internet didn’t define nuanced standards for identity -- most everything was just username and passwords. Over the past 20 years we have seen a range of standards that solve some identity challenges, including SAML, LDAP, OpenID Connect, OAuth, SCIM, Information Cards, and FIDO. None of them have comprehensively addressed the challenge of identity at internet scale.
A new set of standards is emerging that creates an infrastructure for self-sovereign identity that can scale. This talk looks forward to help you think ahead and prepare for this new infrastructure. We will walk through standards that together create a new identity infrastructure that leverages the blockchain. This isn’t about what you can implement tomorrow to solve your employee identity challenges or manage customer accounts. It will instead prepare you for the coming changes and help you play a role in shaping them.
Identity Management for Web Application DevelopersWSO2
This WSO2 workshop on identity management for web application developers covered the following topics:
1. Identity Management 101
2. Proxy-based / Agent-based approaches for securing web apps.
3. Enable Single Sign On with OpenID Connect and SAML 2.0
4. Calling secured APIs from a web application.
5. Securing Single Page Applications (SPA)
6. Identity APIs for user provisioning and access control.
Technologies:
Apache modules for SAML and OIDC (mod_auth_mellon and mod_auth_openidc), Java, Tomcat, Angular JS, Python, WSO2 Identity Server, WSO2 API Manager
Audience: Web application developers
I gave this version of my Design for Privacy presentation to the NY Experience Group of Publicis Sapient on Monday, 4 October 2021. It includes examples of privacy and security issues, our role in designing for privacy as design professionals, as well as best practices for privacy to keep in mind.
Presented on the main stage at CVC2019 in Zug, Switzerland. Discusses the shifts in how digital identity, particularly CULedger's self-sovereign identity solution MyCUID is being used to return to a normal approach for relationships. Discusses future application in payments as well.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
1. Trust and Identity In Virtual Worlds and Collaborative Spaces Anthony Nadalin, Distinguished Engineer, IBM
2. Early Virtual Worlds & Collaborative Spaces Business Applications Commerce Collaboration and Events Education and Training Emerging Business Applications
3.
4.
5. Collaborative spaces and virtual communities * MMOG = Massive Multiplayer Online Game Multi-service Platforms Social Computing 3D/Realtime Internet/MMOGs Common problem: Trust and Identity Enterprise Customers & Governments
17. Reputation Technology Summary of actual past behavior, by service provider Real identity Background check against external data Peer reviews portable specific Identity Verification, Identity Proofing = Strong Identity Trust in specific attribute or future behavior? Digital Identity